{"title":"Secrecy Codes for State Estimation of General Linear Systems","authors":"Damián Marelli;Tianju Sui;Minyue Fu;Qianqian Cai","doi":"10.1109/TAC.2024.3463728","DOIUrl":null,"url":null,"abstract":"A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing this information exchange. Secrecy coding schemes have been recently proposed to achieve immunity to eavesdropping. The essential idea consists in coding the transmitting information in a way such that a single packet lost by the eavesdropper causes an irrecoverable error of its state estimation. Common limitations of the available methods are the assumptions that the local system can directly measure its internal state and that the system is unstable. In this work, we drop these assumptions and consider the general case in which measurements are noisy linear combinations of an inaccessible internal state and that the system is not necessarily unstable. To design the coding scheme, we introduce the concept of <italic>total secrecy</i>, meaning that if the eavesdropper misses a packet that is available at the remote estimator, the former behaves as if no further packets were received. We derive a sufficient condition for total secrecy, as well as the code achieving this property. Also, for the case in which we cannot guarantee total secrecy, we address the problem of designing a code achieving maximum secrecy in some sense. We present numerical examples illustrating our claims.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 2","pages":"1161-1168"},"PeriodicalIF":7.0000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10684094/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing this information exchange. Secrecy coding schemes have been recently proposed to achieve immunity to eavesdropping. The essential idea consists in coding the transmitting information in a way such that a single packet lost by the eavesdropper causes an irrecoverable error of its state estimation. Common limitations of the available methods are the assumptions that the local system can directly measure its internal state and that the system is unstable. In this work, we drop these assumptions and consider the general case in which measurements are noisy linear combinations of an inaccessible internal state and that the system is not necessarily unstable. To design the coding scheme, we introduce the concept of total secrecy, meaning that if the eavesdropper misses a packet that is available at the remote estimator, the former behaves as if no further packets were received. We derive a sufficient condition for total secrecy, as well as the code achieving this property. Also, for the case in which we cannot guarantee total secrecy, we address the problem of designing a code achieving maximum secrecy in some sense. We present numerical examples illustrating our claims.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.